source: http://www.securityfocus.com/bid/41531/info Joomla! Rapid-Recipe component is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. The following example input is available: ">><marquee><h1>XSS3d By Sid3^effects</h1><marquee>
Related ExploitsOther Possible E-DB Search Terms: Joomla! Component 'Rapid-Recipe'
|2010-07-10||Joomla! Component 'Rapid-Recipe' - Persistent Cross-Site Scripting||Sid3^effects|